These startups promise to thwart today's cyberthreats with cutting-edge technologies.
Every time I have a network automation presentation (be it a 2-day workshop or a 45 minute keynote) I get the same question afterwards: “How do we deal with exceptions?”
The correct answer is obvious: “there should be no exceptions, because one-offs usually cost you more than you earn with them,” but as always the reality tends to intervene.
Read more ...Peer to peer applications are a significant challenge for policy enforcement solutions. Any flows that slip through as an undetermined application type may allow the file sharing app to function. The first key to addressing this challenge is simple visibility into which hosts or users may be abusing the AUP with these types of applications. This article shows a quick and easy way to create Peer to Peer dashboard in the Firepower Management Console.
For those that have already attempted this, there are a number of challenges that may have surfaced. First there are no readily available widgets or criteria that will show the desired information. Experimenting with search constraints and the connection table quickly reveals that the desired information can be easily accessed by using the “peer to peer” Application Protocol Category search criteria. Unfortunately, the Connection Table is not readily available to the Dashboard Widgets. The Connection Summary table is available, but it does not have the Application Protocol Category (required for the search constraints).
My goal was to build a few dashboard widgets to give visibility into Peer to Peer activity. For this article I will demonstrate the steps required to build those widgets. The first widget will provide Continue reading
Presenter: Steven Heinsius, Product Manager, Enterprise Networking Group
I’m hoping the title of this session could also be “7 Ways to not be a TOTAL Wireless Noob” since that’s more my level.
The Basics
Taking a 100 employee company….
In 2007-2009, networks were designed for coverage. Those networks are still around and are being asked to support (on average) 3 devices per person.
WiFi is
Distance vs modulation
Presenters:
Presented by Muhammad A Imam, Sr Manager Technical Marketing Engineering
Just when it was bragging about its Azure integration.
Connected Pipelines Validated Design: coming this week! Cisco.com/go/cvd > Oil & Gas area
For those that aren’t familiar with the oil/gas business, there’s three areas:
Cisco can work and play in all three areas. Eg:
ISA95/99 (aka Perdue Model) – describes an architecture for different security zones within the industrial environment.
Operational principles (compare this with a typical enterprise environment and principles):
With respect to 24×7 Continue reading